https://gitcode.net/openharmony/third_party_openssl/-/commit/70de68c4e4affcfb4ee2aed9157cda417522bfd1Do not ignore empty associated data with AES-SIV mode2023-07-18T09:31:36+08:00Tomas Mraztomas@openssl.org
The AES-SIV mode allows for multiple associated data items
authenticated separately with any of these being 0 length.
The provided implementation ignores such empty associated data
which is incorrect in regards to the RFC 5297 and is also
a security issue because such empty associated data then become
unauthenticated if an application expects to authenticate them.
Fixes CVE-2023-2975
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:matt@openssl.org" title="matt@openssl.org"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg3" style="text-decoration: none">N</a><a href="mailto:matt@openssl.org" title="matt@openssl.org">Matt Caswell</a> <<a href="mailto:matt@openssl.org" title="matt@openssl.org">matt@openssl.org</a>></span>
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:pauli@openssl.org" title="pauli@openssl.org"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg3" style="text-decoration: none">N</a><a href="mailto:pauli@openssl.org" title="pauli@openssl.org">Paul Dale</a> <<a href="mailto:pauli@openssl.org" title="pauli@openssl.org">pauli@openssl.org</a>></span>
(Merged from <a href="https://github.com/openssl/openssl/pull/21384" rel="nofollow noreferrer noopener" target="_blank">https://github.com/openssl/openssl/pull/21384</a>)
(cherry picked from commit c426c281cfc23ab182f7d7d7a35229e7db1494d9)
Signed-off-by: <span data-trailer="Signed-off-by:"><a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg6" style="text-decoration: none">N</a><a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com">code4lala</a> <<a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com">fengziteng2@huawei.com</a>></span>https://gitcode.net/openharmony/third_party_openssl/-/commit/87518c9f4f3be85725bca69ba097567ff99ac55dAdd CHANGES.md and NEWS.md entries for CVE-2023-29752023-07-18T09:40:22+08:00Tomas Mraztomas@openssl.orgReviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:matt@openssl.org" title="matt@openssl.org"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg3" style="text-decoration: none">N</a><a href="mailto:matt@openssl.org" title="matt@openssl.org">Matt Caswell</a> <<a href="mailto:matt@openssl.org" title="matt@openssl.org">matt@openssl.org</a>></span>
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:pauli@openssl.org" title="pauli@openssl.org"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg2" style="text-decoration: none">N</a><a href="mailto:pauli@openssl.org" title="pauli@openssl.org">Paul Dale</a> <<a href="mailto:pauli@openssl.org" title="pauli@openssl.org">pauli@openssl.org</a>></span>
(Merged from <a href="https://github.com/openssl/openssl/pull/21384" rel="nofollow noreferrer noopener" target="_blank">https://github.com/openssl/openssl/pull/21384</a>)
(cherry picked from commit 1e398bec538978b9957e69bf9e12b3c626290bea)
Signed-off-by: <span data-trailer="Signed-off-by:"><a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg1" style="text-decoration: none">N</a><a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com">code4lala</a> <<a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com">fengziteng2@huawei.com</a>></span>https://gitcode.net/openharmony/third_party_openssl/-/commit/566ce903b69cd2ec717e4bf77e7e0b5529c1d021!124 Fixes CVE-2023-29752023-07-18T12:41:05+00:00openharmony_ci120357966@qq.comMerge pull request !124 from code4lala/Fixes_CVE-2023-2975https://gitcode.net/openharmony/third_party_openssl/-/commit/9a81b024114726454bb19860cc1f099e7e50fdfaFix DH_check() excessive time with over sized modulus2023-07-20T15:48:47+08:00Matt Caswellmatt@openssl.org
The DH_check() function checks numerous aspects of the key or parameters
that have been supplied. Some of those checks use the supplied modulus
value even if it is excessively large.
There is already a maximum DH modulus size (10,000 bits) over which
OpenSSL will not generate or derive keys. DH_check() will however still
perform various tests for validity on such a large modulus. We introduce a
new maximum (32,768) over which DH_check() will just fail.
An application that calls DH_check() and supplies a key or parameters
obtained from an untrusted source could be vulnerable to a Denial of
Service attack.
The function DH_check() is itself called by a number of other OpenSSL
functions. An application calling any of those other functions may
similarly be affected. The other functions affected by this are
DH_check_ex() and EVP_PKEY_param_check().
CVE-2023-3446
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:pauli@openssl.org" title="pauli@openssl.org"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg4" style="text-decoration: none">N</a><a href="mailto:pauli@openssl.org" title="pauli@openssl.org">Paul Dale</a> <<a href="mailto:pauli@openssl.org" title="pauli@openssl.org">pauli@openssl.org</a>></span>
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:tom.cosgrove@arm.com" title="tom.cosgrove@arm.com"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg5" style="text-decoration: none">N</a><a href="mailto:tom.cosgrove@arm.com" title="tom.cosgrove@arm.com">Tom Cosgrove</a> <<a href="mailto:tom.cosgrove@arm.com" title="tom.cosgrove@arm.com">tom.cosgrove@arm.com</a>></span>
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:bernd.edlinger@hotmail.de" title="bernd.edlinger@hotmail.de"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg5" style="text-decoration: none">N</a><a href="mailto:bernd.edlinger@hotmail.de" title="bernd.edlinger@hotmail.de">Bernd Edlinger</a> <<a href="mailto:bernd.edlinger@hotmail.de" title="bernd.edlinger@hotmail.de">bernd.edlinger@hotmail.de</a>></span>
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:tomas@openssl.org" title="tomas@openssl.org"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg2" style="text-decoration: none">N</a><a href="mailto:tomas@openssl.org" title="tomas@openssl.org">Tomas Mraz</a> <<a href="mailto:tomas@openssl.org" title="tomas@openssl.org">tomas@openssl.org</a>></span>
(Merged from <a href="https://github.com/openssl/openssl/pull/21451" rel="nofollow noreferrer noopener" target="_blank">https://github.com/openssl/openssl/pull/21451</a>)
(cherry picked from commit 9e0094e2aa1b3428a12d5095132f133c078d3c3d)
Signed-off-by: <span data-trailer="Signed-off-by:"><a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg5" style="text-decoration: none">N</a><a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com">code4lala</a> <<a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com">fengziteng2@huawei.com</a>></span>https://gitcode.net/openharmony/third_party_openssl/-/commit/64928fc2c0a2a42e3ef5d6f1029a290180ed9025Update CHANGES/NEWS for CVE-2023-34462023-07-20T15:52:20+08:00Matt Caswellmatt@openssl.orgReviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:pauli@openssl.org" title="pauli@openssl.org"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg6" style="text-decoration: none">N</a><a href="mailto:pauli@openssl.org" title="pauli@openssl.org">Paul Dale</a> <<a href="mailto:pauli@openssl.org" title="pauli@openssl.org">pauli@openssl.org</a>></span>
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:tom.cosgrove@arm.com" title="tom.cosgrove@arm.com"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg2" style="text-decoration: none">N</a><a href="mailto:tom.cosgrove@arm.com" title="tom.cosgrove@arm.com">Tom Cosgrove</a> <<a href="mailto:tom.cosgrove@arm.com" title="tom.cosgrove@arm.com">tom.cosgrove@arm.com</a>></span>
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:bernd.edlinger@hotmail.de" title="bernd.edlinger@hotmail.de"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg4" style="text-decoration: none">N</a><a href="mailto:bernd.edlinger@hotmail.de" title="bernd.edlinger@hotmail.de">Bernd Edlinger</a> <<a href="mailto:bernd.edlinger@hotmail.de" title="bernd.edlinger@hotmail.de">bernd.edlinger@hotmail.de</a>></span>
Reviewed-by: <span data-trailer="Reviewed-by:"><a href="mailto:tomas@openssl.org" title="tomas@openssl.org"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg1" style="text-decoration: none">N</a><a href="mailto:tomas@openssl.org" title="tomas@openssl.org">Tomas Mraz</a> <<a href="mailto:tomas@openssl.org" title="tomas@openssl.org">tomas@openssl.org</a>></span>
(Merged from <a href="https://github.com/openssl/openssl/pull/21451" rel="nofollow noreferrer noopener" target="_blank">https://github.com/openssl/openssl/pull/21451</a>)
(cherry picked from commit 4ec53ad6e1791daafbe26bdbd539f2ba9172959a)
Signed-off-by: <span data-trailer="Signed-off-by:"><a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com"></a><a href="javascript:void(0)" class="avatar s16 avatar-inline identicon bg2" style="text-decoration: none">N</a><a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com">code4lala</a> <<a href="mailto:fengziteng2@huawei.com" title="fengziteng2@huawei.com">fengziteng2@huawei.com</a>></span>https://gitcode.net/openharmony/third_party_openssl/-/commit/2a14625b9e4189aca6b75ddc740b6d31a738820c!125 CVE-2023-34462023-07-26T02:44:12+00:00openharmony_ci120357966@qq.comMerge pull request !125 from code4lala/CVE-2023-3446